Описание
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
Релиз | Статус | Примечание |
---|---|---|
devel | not-affected | 1:6.1p1-3 |
esm-infra-legacy/trusty | not-affected | 1:6.1p1-3 |
esm-infra/xenial | not-affected | 1:6.1p1-3 |
hardy | ignored | end of life |
lucid | ignored | end of life |
oneiric | ignored | end of life |
precise | ignored | |
quantal | ignored | end of life |
raring | not-affected | 1:6.1p1-3 |
saucy | not-affected | 1:6.1p1-3 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
The default configuration of OpenSSH through 6.1 enforces a fixed time ...
The default configuration of OpenSSH through 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote attackers to cause a denial of service (connection-slot exhaustion) by periodically making many new TCP connections.
EPSS
5 Medium
CVSS2